Criterion-based access control is typically implemented by means of a pre-programmed ____.

A. authorization list
B. access control list
C. discretionary control list
D. access authorization list


Answer: B

Computer Science & Information Technology

You might also like to view...

What is the maximum number of simultaneous users that can access a Windows 7 share?

A) 20 B) 45 C) 60 D) 8 E) 10

Computer Science & Information Technology

For Ethernet, the MTU may range from ____.

A. 68 to 1300 B. 68 to 1500 C. 1300 to 1500 D. 68 to 9000

Computer Science & Information Technology

In C, relational expressions are evaluated to yield a boolean result.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Information is NOT the critical asset that organizations need to secure.

a. true b. false

Computer Science & Information Technology